Securing commercial WiFi-based UAVs from common security attacks M Hooper, Y Tian, R Zhou, B Cao, AP Lauf, L Watkins, WH Robinson, ... MILCOM 2016-2016 IEEE Military Communications Conference, 1213-1218, 2016 | 186 | 2016 |
A passive approach to rogue access point detection L Watkins, R Beyah, C Corbett IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 355-360, 2007 | 103 | 2007 |
Detection of tunnels in PCAP data by random forests AL Buczak, PA Hanke, GJ Cancro, MK Toma, LA Watkins, JS Chavis Proceedings of the 11th Annual Cyber and Information Security Research …, 2016 | 73 | 2016 |
Identification of botnet activity in IoT network traffic using machine learning M Hegde, G Kepnang, M Al Mazroei, JS Chavis, L Watkins 2020 International conference on intelligent data science technologies and …, 2020 | 38 | 2020 |
Using semi-supervised machine learning to address the big data problem in DNS networks L Watkins, S Beck, J Zook, A Buczak, J Chavis, WH Robinson, JA Morales, ... 2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 | 34 | 2017 |
Exploiting multi-vendor vulnerabilities as back-doors to counter the threat of rogue small unmanned aerial systems L Watkins, J Ramos, G Snow, J Vallejo, WH Robinson, AD Rubin, ... Proceedings of the 1st ACM MobiHoc workshop on mobile IoT sensing, security …, 2018 | 27 | 2018 |
Don’t drink the cyber: Extrapolating the possibilities of Oldsmar’s water treatment cyberattack J Cervini, A Rubin, L Watkins International conference on cyber warfare and security 17 (1), 19-25, 2022 | 26 | 2022 |
Measuring and mitigating bias in ai-chatbots H Beattie, L Watkins, WH Robinson, A Rubin, S Watkins 2022 IEEE International Conference on Assured Autonomy (ICAA), 117-123, 2022 | 25 | 2022 |
A passive solution to the CPU resource discovery problem in cluster grid networks L Watkins, WH Robinson, R Beyah IEEE Transactions on Parallel and Distributed Systems 22 (12), 2000-2007, 2011 | 24 | 2011 |
Fighting banking botnets by exploiting inherent command and control vulnerabilities L Watkins, C Kawka, C Corbett, WH Robinson 2014 9th International Conference on Malicious and Unwanted Software: The …, 2014 | 20 | 2014 |
Constructing timing-based covert channels in mobile networks by adjusting cpu frequency M Yue, WH Robinson, L Watkins, C Corbett Proceedings of the Third Workshop on Hardware and Architectural Support for …, 2014 | 19 | 2014 |
Remotely inferring device manipulation of industrial control systems via network behavior G Lontorfos, KD Fairbanks, L Watkins, WH Robinson 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015 | 18 | 2015 |
An investigative study into an autonomous UAS traffic management system for congested airspace safety L Watkins, N Sarfaraz, S Zanlongo, J Silbermann, T Young, R Sleight 2021 IEEE International Conference on Communications Workshops (ICC …, 2021 | 17 | 2021 |
Using network traffic to verify mobile device forensic artifacts N Malik, J Chandramouli, P Suresh, K Fairbanks, L Watkins, ... 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017 | 17 | 2017 |
Using network traffic to remotely identify the type of applications executing on mobile devices L Watkins, C Corbett, B Salazar, K Fairbanks, WH Robinson Johns Hopkins University Applied Physics Laboratory Laurel, MD USA, 2013 | 17 | 2013 |
The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system R Nair, C Nayak, L Watkins, KD Fairbanks, K Memon, P Wang, ... Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, 195-223, 2017 | 16 | 2017 |
Agile services and analysis framework for autonomous and autonomic critical infrastructure J Maurio, P Wood, S Zanlongo, J Silbermann, T Sookoor, A Lorenzo, ... Innovations in Systems and Software Engineering 19 (2), 145-156, 2023 | 13 | 2023 |
Using network traffic to infer hardware state: A kernel-level investigation L Watkins, WH Robinson, R Beyah ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-22, 2015 | 11 | 2015 |
Using network traffic to passively detect under utilized resources in high performance cluster grid computing environments L Watkins, R Beyah, C Corbett Proceedings of the first international conference on Networks for grid …, 2007 | 11 | 2007 |
Privacy violating opensource intelligence threat evaluation framework: a security assessment framework for critical infrastructure owners A Cartagena, G Rimmer, T van Dalsen, L Watkins, WH Robinson, A Rubin 2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020 | 10 | 2020 |